Group-based unidirectional proxy re-encryption scheme

被引:0
|
作者
School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China [1 ]
机构
来源
Inf. Technol. J. | 2009年 / 1卷 / 83-88期
关键词
Cryptography;
D O I
10.3923/itj.2009.83.88
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [42] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [43] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    ENTROPY, 2023, 25 (05)
  • [44] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    中国通信, 2019, 16 (10) : 174 - 190
  • [45] A Scheme for Electronic Evidence Sharing Based on Blockchain and Proxy Re-encryption
    Miao, Zhikun
    Ye, Chengxu
    Yang, Ping
    Liu, Rui
    Liu, Bing
    Chen, Ying
    2021 4TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2021, 2021, : 11 - 16
  • [46] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [47] Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
    Guo Q.
    Tian Y.-L.
    Wan L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (02): : 477 - 488
  • [48] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [49] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [50] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567